Professional Documents
Culture Documents
By Diana
Operating Systems
Objectives
Secure communication Key agreement protocols Public key infrastructure, certificates and certificates authorities Secure communication protocols Steganography
Operating Systems
Secure communication
The 5 fundamental requirements:
Privacy
Information passed to 3rd party without our knowledge
Integrity
Information sent or received have not been altered or modified
Authentication
Verifying of users identities
Authorization
Users indentification and password is required
Nonrepudiation
Information sent or received legally proven
Operating Systems 3
Digital signature
Authenticates the users identity, difficult to forge
Operating Systems 4
Digital certificates
Digital document that identifies users and is issued by a certificate authority
Wireless security
to protect wireless LAN
Wired equivalent privacy protocol Wi-fi protected access
Operating Systems
Steganography
Is a practice of hiding an information within another information
Use of digital watermarks
For property protection Able to prevent others to copy the original copy of the owner
Operating Systems
Summary
Secure communication
Privacy Authentication nonrepudiation Digital envelope Key management Digital signature integrity authorization
Operating Systems
Summary
Public key infrastructure, certificates and certificates authorities
Definitions of PKI, digital certificates and CA
Operating Systems
10
Summary
Steganography
Definition of steganography Digital watermarks
Operating Systems
11